Setting Up Lab

Viewing 11 reply threads
  • Author
    Posts
    • #3218
      mambo
      Participant

      Hello!

      Just wondering if anyone had any input on setting up a lab. I now have 3 computers to play with and was thinking its about tiome i got some hands on experience. I currently have two laptops and a desktop.

      Does anyone have any input on what possible configurations I could put on the systems so I can get some hands on network security experience, e.g pen testing. Im still in the stage of having done quite a bit of reading but having no experience, so if anyone knows of any tutorials for such lab testing I would greatly appreciate it.

      Kind regards

      Mambo

    • #21448
      jason
      Participant

      Backtrack would be a good distro to load to access quite a few different tools.

      http://www.remote-exploit.org/backtrack.html

    • #21449
      mambo
      Participant

      i had a play with backtrack when i setup a smoothwall firewall, but didnt really get anywhere with it.

      Has anyone had experience with damn vulnerable linux? I would like something easy to exploit so i can see some results =]

    • #21450
      dynamik
      Participant

      @mambo wrote:

      Has anyone had experience with damn vulnerable linux? I would like something easy to exploit so i can see some results =]

      No, but I’m definitely going to check it out. Thanks for bringing that up!

    • #21451
      COm_BOY
      Participant

      Damn Vulnerable Linux is also offering certifications
      hxxp://www.damnvulnerablelinux.org/index.php/eng/Certification

      One more has been added to BackTrack competitors list .

    • #21452
      KrisTeason
      Participant

      Mambo, you may want to look into a book called “Build Your Own Security Lab: A Field Guide for Network Testing”. A friend of mine read it and he said it’d be a good start for people wanting to set up their own labs.

    • #21453
      timmedin
      Participant

      I highly recommend setting up one machine as a VMWare ESXi server. You can host all sorts of guest with different OSes, patch levels, and software. It also has the ability for snapshots which is very useful for testing and learning.

    • #21454
      Jhaddix
      Participant

      Alternatively you can check out NETinVM

      NETinVM is a single VMware virtual machine image that contains, ready to run, a series of User-mode Linux (UML) virtual machines which, when started, conform a whole computer network inside the VMware virtual machine. Hence the name NETinVM, an acronym for NETwork in Virtual Machine. NETinVM has been conceived mainly as an educational tool for teaching and learning about operating systems, computer networks and system and network security, but other uses are certainly possible.

    • #21455
      jason
      Participant

      @KrisTeason wrote:

      Mambo, you may want to look into a book called “Build Your Own Security Lab: A Field Guide for Network Testing”.

      It is a good book. I did run across a few dead links in it however…

    • #21456
      charlottebandit
      Participant

      The thing with pentesting, is that you need SOMETHING to assess whether it’s a service or network.  What I mean for service is whether it’s a web server, database server, data center, web services, or even an IP voice solution.  By assessing the network, I mean attempting to assess targets through a real switch, real router, and multiple other security controls.

      Hence my point is that you’ll need to either team up with someone who knows how to configure servers, or a network guy unless you want to learn either one (or both!).  Not knowing how to do one at least leaves you at a major disadvantage I feel.

    • #21457
      RoleReversal
      Participant

      @charlottebandit wrote:

      The thing with pentesting, is that you need SOMETHING to assess whether it’s a service or network.  What I mean for service is whether it’s a web server, database server, data center, web services, or even an IP voice solution.  By assessing the network, I mean attempting to assess targets through a real switch, real router, and multiple other security controls.

      Agreed, there are probably well known to most here (mentioned in the forums a lot) but check out De-ICE and DVL to get you start with targets.

    • #21458
      timmedin
      Participant

      @charlottebandit wrote:

      The thing with pentesting, is that you need SOMETHING to assess whether it’s a service or network.  What I mean for service is whether it’s a web server, database server, data center, web services, or even an IP voice solution.  By assessing the network, I mean attempting to assess targets through a real switch, real router, and multiple other security controls.

      Hence my point is that you’ll need to either team up with someone who knows how to configure servers, or a network guy unless you want to learn either one (or both!).  Not knowing how to do one at least leaves you at a major disadvantage I feel.

      Great idea. You could get additional experience and knowledge by setting up additional linux VMs as IPS, Firewall, or for routing. This would teach you how to configure them, and how to get past them. Again, I recommend VMWare’s ESXi since it is free and based on the industry leading VM platform. Not a bad idea to learn VMWare while you are at it. ESXi will allow you to set up multiple networks for setting up the lab described above.

Viewing 11 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2022 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?